HOPL-II The second ACM SIGPLAN conference on History of programming languages
Functional documents for computer systems
Science of Computer Programming
Some Conservative Stopping Rules for the Operational Testing of Safety-Critical Software
IEEE Transactions on Software Engineering
Mechanizing proof: computing, risk, and trust
Mechanizing proof: computing, risk, and trust
The SLAM project: debugging system software via static analysis
POPL '02 Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Beyond calculation
Problem frames: analyzing and structuring software development problems
Problem frames: analyzing and structuring software development problems
Safer C: Developing Software for in High-Integrity and Safety-Critical Systems
Safer C: Developing Software for in High-Integrity and Safety-Critical Systems
Coping with Crosscutting Software Changes Using Information Transparency
REFLECTION '01 Proceedings of the Third International Conference on Metalevel Architectures and Separation of Crosscutting Concerns
RE '01 Proceedings of the Fifth IEEE International Symposium on Requirements Engineering
Context- and path-sensitive memory leak detection
Proceedings of the 10th European software engineering conference held jointly with 13th ACM SIGSOFT international symposium on Foundations of software engineering
News: lost radio contact leaves pilots on their own
IEEE Spectrum
Proving the absence of run-time errors in safety-critical avionics code
EMSOFT '07 Proceedings of the 7th ACM & IEEE international conference on Embedded software
Software for Dependable Systems: Sufficient Evidence?
Software for Dependable Systems: Sufficient Evidence?
Software architecture built from behavior models
ACM SIGSOFT Software Engineering Notes
Monterey Phoenix, or how to make software architecture executable
Proceedings of the 24th ACM SIGPLAN conference companion on Object oriented programming systems languages and applications
Using formal methods for security in the Xenon project
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
A formal approach for the specification and verification of trustworthy component-based systems
Journal of Systems and Software
A lightweight code analysis and its role in evaluation of a dependability case
Proceedings of the 33rd International Conference on Software Engineering
Proceedings of the 38th annual international symposium on Computer architecture
System verification through program verification
FM'11 Proceedings of the 17th international conference on Formal methods
Patterns for building dependable systems with trusted bases
Proceedings of the 17th Conference on Pattern Languages of Programs
Hi-index | 0.02 |
Who could fault an approach that offers greater credibility at reduced cost?